Academic literature on the topic 'Data and information privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data and information privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data and information privacy"

1

Fletcher, Sam, and Md Zahidul Islam. "Measuring Information Quality for Privacy Preserving Data Mining." International Journal of Computer Theory and Engineering 7, no. 1 (2014): 21–28. http://dx.doi.org/10.7763/ijcte.2015.v7.924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." Journal of Computer and System Sciences 60, no. 3 (2000): 592–629. http://dx.doi.org/10.1006/jcss.1999.1689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mihai Yiannaki, Simona, Lucia Gibilaro, and Gianluca Mattarocci. "Big data firms and information privacy." Global Business and Economics Review 25, no. 3/4 (2021): 355. http://dx.doi.org/10.1504/gber.2021.10042256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yiannaki, Simona Mihai, Lucia Gibilaro, and Gianluca Mattarocci. "Big data firms and information privacy." Global Business and Economics Review 25, no. 3/4 (2021): 355. http://dx.doi.org/10.1504/gber.2021.118713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anderson, R. "Undermining data privacy in health information." BMJ 322, no. 7284 (2001): 442–43. http://dx.doi.org/10.1136/bmj.322.7284.442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

White, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." International Journal of Information Security and Privacy 5, no. 1 (2011): 50–66. http://dx.doi.org/10.4018/jisp.2011010104.

Full text
Abstract:
In the Web dependent world, companies must respect and protect individuals’ information privacy. Companies develop and implement corporate information privacy policies to comply with the domestic and international information privacy laws and regulations. This paper investigates: (a) the approach used by multinational and domestic companies to develop and implement corporate information privacy policies; and (b) the perception of corporate managers/professionals toward information privacy legislation and secondary use of personally identifiable information (PII) that organizations collect. A s
APA, Harvard, Vancouver, ISO, and other styles
8

Agrawal, Rakesh, and Ramakrishnan Srikant. "Privacy-preserving data mining." ACM SIGMOD Record 29, no. 2 (2000): 439–50. http://dx.doi.org/10.1145/335191.335438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Ting, and Ling Liu. "Output privacy in data mining." ACM Transactions on Database Systems 36, no. 1 (2011): 1–34. http://dx.doi.org/10.1145/1929934.1929935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Haibo, Jianliang Xu, Sai Tung On, Jing Du, and Joseph Kee-Yin Ng. "Privacy-aware location data publishing." ACM Transactions on Database Systems 35, no. 3 (2010): 1–42. http://dx.doi.org/10.1145/1806907.1806910.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Data and information privacy"

1

Aron, Yotam. "Information privacy for linked data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85215.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2013.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 77-79).<br>As data mining over massive amounts of linked data becomes more and more prevalent in research applications, information privacy becomes a more important issue. This is especially true in the biological and medica
APA, Harvard, Vancouver, ISO, and other styles
2

El-Sheikh, Mahmoud Mohamed Omar. "Developing a Libyan information privacy framework." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/65866/1/Mahmoud%20Mohamed%20Omar_El-Sheikh_Thesis.pdf.

Full text
Abstract:
This thesis considers how an information privacy system can and should develop in Libya. Currently, no information privacy system exists in Libya to protect individuals when their data is processed. This research reviews the main features of privacy law in several key jurisdictions in light of Libya's social, cultural, and economic context. The thesis identifies the basic principles that a Libyan privacy law must consider, including issues of scope, exceptions, principles, remedies, penalties, and the establishment of a legitimate data protection authority. This thesis concludes that Libya sho
APA, Harvard, Vancouver, ISO, and other styles
3

An, Nan. "Protect Data Privacy in E-Healthcare in Sweden." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1619.

Full text
Abstract:
<p>Sweden healthcare adopted much ICT (information and communication technology). It is a highly information intensive place. This thesis gives a brief description of the background of healthcare in Sweden and ICT adoption in healthcare, introduces an Information system security model, describes the technology and law about data privacy and carries out a case through questionnaire and interview.</p>
APA, Harvard, Vancouver, ISO, and other styles
4

Sang, Lin. "Social Big Data and Privacy Awareness." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-242444.

Full text
Abstract:
Based on the rapid development of Big Data, the data from the online social network becomea major part of it. Big data make the social networks became data-oriented rather than social-oriented. Taking this into account, this dissertation presents a qualitative study to research howdoes the data-oriented social network affect its users’ privacy management for nowadays. Within this dissertation, an overview of Big Data and privacy issues on the social network waspresented as a background study. We adapted the communication privacy theory as a frameworkfor further analysis how individuals manage t
APA, Harvard, Vancouver, ISO, and other styles
5

Zheng, Yao. "Privacy Preservation for Cloud-Based Data Sharing and Data Analytics." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/73796.

Full text
Abstract:
Data privacy is a globally recognized human right for individuals to control the access to their personal information, and bar the negative consequences from the use of this information. As communication technologies progress, the means to protect data privacy must also evolve to address new challenges come into view. Our research goal in this dissertation is to develop privacy protection frameworks and techniques suitable for the emerging cloud-based data services, in particular privacy-preserving algorithms and protocols for the cloud-based data sharing and data analytics services. Cloud co
APA, Harvard, Vancouver, ISO, and other styles
6

Sivakumar, Anusha. "Enhancing Privacy Of Data Through Anonymization." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177349.

Full text
Abstract:
A steep rise in availability of personal data has resulted in endless opportunities for data scientists who utilize this open data for research. However, such easy availability of complex personal data challenges privacy of individuals represented in the data. To protect privacy, traditional methods such as using pseudonyms or blurring identity of individuals are followed before releasing data. These traditional methods alone are not sufficient to enhance privacy because combining released data with other publicly available data or background knowledge identifies individuals. A potential solut
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.

Full text
Abstract:
Healthcare data can contain sensitive, personal, and confidential information that should remain secure. Despite the efforts to protect patient data, security breaches occur and may result in fraud, identity theft, and other damages. Grounded in the theoretical backdrop of integrated system theory, the purpose of this study was to determine the association between data privacy breaches, data storage locations, business associates, covered entities, and number of individuals affected. Study data consisted of secondary breach information retrieved from the Department of Health and Human Services
APA, Harvard, Vancouver, ISO, and other styles
8

Katsikouli, Panagiota. "Distributed and privacy preserving algorithms for mobility information processing." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31110.

Full text
Abstract:
Smart-phones, wearables and mobile devices in general are the sensors of our modern world. Their sensing capabilities offer the means to analyze and interpret our behaviour and surroundings. When it comes to human behaviour, perhaps the most informative feature is our location and mobility habits. Insights from human mobility are useful in a number of everyday practical applications, such as the improvement of transportation and road network infrastructure, ride-sharing services, activity recognition, mobile data pre-fetching, analysis of the social behaviour of humans, etc. In this dissertati
APA, Harvard, Vancouver, ISO, and other styles
9

Gonçalves, João Miguel Ribeiro. "Context-awareness privacy in data communications." Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/15760.

Full text
Abstract:
Doutoramento em Informática<br>Internet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed
APA, Harvard, Vancouver, ISO, and other styles
10

Dayarathna, Rasika. "Discovering Constructs and Dimensions for Information Privacy Metrics." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-89336.

Full text
Abstract:
Privacy is a fundamental human right. During the last decades, in the information age, information privacy has become one of the most essential aspects of privacy. Information privacy is concerned with protecting personal information pertaining to individuals. Organizations, which frequently process the personal information, and individuals, who are the subjects of the information, have different needs, rights and obligations. Organizations need to utilize personal information as a basis to develop tailored services and products to their customers in order to gain advantage over their competit
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Data and information privacy"

1

Klosek, Jacqueline. Data privacy in the information age. Quorum Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1959-, Schwartz Paul M., ed. Information privacy law. 4th ed. Wolters Kluwer Law & Business, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tucker, Greg. Information privacy law in Australia. Longman Professional, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1959-, Schwartz Paul M., ed. Privacy, information, and technology. 3rd ed. Wolters Kluwer Law & Business, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1959-, Schwartz Paul M., ed. Privacy, information, and technology. 2nd ed. Aspen Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marc, Rotenberg, and Schwartz Paul M. 1959-, eds. Information privacy law. 2nd ed. Aspen Publishers, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1959-, Schwartz Paul M., ed. Information privacy law. 3rd ed. Aspen Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Marc, Rotenberg, ed. Information privacy law. Aspen Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sol, Bermann, and International Association of Privacy Professionals, eds. Information privacy: Official reference for the Certified Information Privacy Professional (CIPP). International Association of Privacy Professionals, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lavié, Humberto Quiroga. Habeas data. Zavalia, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data and information privacy"

1

Zhang, Rui. "Acquiring Key Privacy from Data Privacy." In Information Security and Cryptology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21518-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nwankwo, Iheanyi Samuel. "Information Privacy in Nigeria." In African Data Privacy Laws. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47317-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hill, Dalvin, Joseph Walker, and John Hale. "Privacy Considerations for Health Information Exchanges." In Medical Data Privacy Handbook. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23633-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

De Capitani di Vimercati, Sabrina, and Pierangela Samarati. "Data Privacy – Problems and Solutions." In Information Systems Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77086-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gritti, Clémentine, Willy Susilo, and Thomas Plantard. "Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy." In Information Security and Privacy. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bennett, Krista, Christian Grothoff, Tzvetan Horozov, and Ioana Patrascu. "Efficient Sharing of Encrypted Data." In Information Security and Privacy. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

De Capitani di Vimercati, Sabrina, and Sara Foresti. "Privacy of Outsourced Data." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14282-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Edwards, Chris, and Nigel Savage. "Data Privacy: the UK Experience." In Information Technology & The Law. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-11768-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Edwards, Chris, and Nigel Savage. "Data Privacy: The Uk Experience." In Information Technology & The Law. Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-08652-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liang, Kaitai, Atsuko Miyaji, and Chunhua Su. "Secure and Traceable Framework for Data Circulation." In Information Security and Privacy. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40253-6_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data and information privacy"

1

Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting data privacy in private information retrieval schemes." In the thirtieth annual ACM symposium. ACM Press, 1998. http://dx.doi.org/10.1145/276698.276723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khoshgozaran, Ali, Houtan Shirani-Mehr, and Cyrus Shahabi. "SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy." In 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW. IEEE, 2008. http://dx.doi.org/10.1109/mdmw.2008.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Srinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.

Full text
Abstract:
Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, we introduce a data protection model with the goal of protecting people’s privacy. Given today’s mobile information needs it is essential to have access to personal data. Social networks are making it
APA, Harvard, Vancouver, ISO, and other styles
4

Ncube, Tyron, Nomusa Dlodlo, and Alfredo Terzoli. "Private Blockchain Networks: A Solution for Data Privacy." In 2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC). IEEE, 2020. http://dx.doi.org/10.1109/imitec50163.2020.9334132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Olawoyin, Anifat M., Carson K. Leung, and Alfredo Cuzzocrea. "Privacy-Preserving Publishing and Visualization of Spatial-Temporal Information." In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2021. http://dx.doi.org/10.1109/bigdata52589.2021.9671564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fleury-Charles, Aaron, Md Minhaz Chowdhury, and Nafiz Rifat. "Data Breaches: Vulnerable Privacy." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9814044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hui Yang, Grace, and Sicong Zhang. "Differential Privacy for Information Retrieval." In WSDM 2018: The Eleventh ACM International Conference on Web Search and Data Mining. ACM, 2018. http://dx.doi.org/10.1145/3159652.3162006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Skinner, G., Song Han, and E. Chang. "Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy." In 22nd International Conference on Data Engineering Workshops (ICDEW'06). IEEE, 2006. http://dx.doi.org/10.1109/icdew.2006.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xia, Weiyi, Murat Kantarcioglu, Zhiyu Wan, Raymond Heatherly, Yevgeniy Vorobeychik, and Bradley Malin. "Process-Driven Data Privacy." In CIKM'15: 24th ACM International Conference on Information and Knowledge Management. ACM, 2015. http://dx.doi.org/10.1145/2806416.2806580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chaves, Iago, and Javam Machado. "Differentially Private Group-by Data Releasing Algorithm." In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.

Full text
Abstract:
Privacy concerns are growing fast because of data protection regulations around the world. Many works have built private algorithms avoiding sensitive information leakage through data publication. Differential privacy, based on formal definitions, is a strong guarantee for individual privacy and the cutting edge for designing private algorithms. This work proposes a differentially private group-by algorithm for data publication under the exponential mechanism. Our method publishes data groups according to a specified attribute while maintaining the desired privacy level and trustworthy utility
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data and information privacy"

1

Soderberg, Eric, and William Glenney. Data Mining and Information Technology: Its Impact on Intelligence Collection and Privacy Rights. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada475402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Green, S., K. Ozawa, and A. Katsnelson. Management Information Base for Data Over Cable Service Interface Specification (DOCSIS) Cable Modems and Cable Modem Termination Systems for Baseline Privacy Plus. Edited by E. Cardona. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, 2021. http://dx.doi.org/10.21248/gups.63413.

Full text
Abstract:
The aim of this study was to identify and evaluate different de-identification techniques that may be used in several mobility-related use cases. To do so, four use cases have been defined in accordance with a project partner that focused on the legal aspects of this project, as well as with the VDA/FAT working group. Each use case aims to create different legal and technical issues with regards to the data and information that are to be gathered, used and transferred in the specific scenario. Use cases should therefore differ in the type and frequency of data that is gathered as well as the l
APA, Harvard, Vancouver, ISO, and other styles
4

Popovic, Ales, H. Jeff Smith, James Y. L. Thong, and Sunil Wattal. Information Privacy. MIS Quarterly, 2017. http://dx.doi.org/10.25300/misq/2019/curations/05292017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chinn, Menzie, and Michael Moore. Private Information and a Macro Model of Exchange Rates: Evidence from a Novel Data Set. National Bureau of Economic Research, 2008. http://dx.doi.org/10.3386/w14175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Zhuang, Michael Sockin, and Wei Xiong. Data Privacy and Temptation. National Bureau of Economic Research, 2020. http://dx.doi.org/10.3386/w27653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhan, Zhijun, and LiWu Chang. Privacy-Preserving Collaborative Data Mining. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada464602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Heffetz, Ori, and Katrina Ligett. Privacy and Data-Based Research. National Bureau of Economic Research, 2013. http://dx.doi.org/10.3386/w19433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mathew, Jijo K., Christopher M. Day, Howell Li, and Darcy M. Bullock. Curating Automatic Vehicle Location Data to Compare the Performance of Outlier Filtering Methods. Purdue University, 2021. http://dx.doi.org/10.5703/1288284317435.

Full text
Abstract:
Agencies use a variety of technologies and data providers to obtain travel time information. The best quality data can be obtained from second-by-second tracking of vehicles, but that data presents many challenges in terms of privacy, storage requirements and analysis. More frequently agencies collect or purchase segment travel time based upon some type of matching of vehicles between two spatially distributed points. Typical methods for that data collection involve license plate re-identification, Bluetooth, Wi-Fi, or some type of rolling DSRC identifier. One of the challenges in each of thes
APA, Harvard, Vancouver, ISO, and other styles
10

Soenen, Karen, Dana Gerlach, Christina Haskins, et al. How can BCO-DMO help with your oceanographic data? How can BCO-DMO help with your oceanographic data?, 2021. http://dx.doi.org/10.1575/1912/27803.

Full text
Abstract:
BCO-DMO curates a database of research-ready data spanning the full range of marine ecosystem related measurements including in-situ and remotely sensed observations, experimental and model results, and synthesis products. We work closely with investigators to publish data and information from research projects supported by the National Science Foundation (NSF), as well as those supported by state, private, and other funding sources. BCO-DMO supports all phases of the data life cycle and ensures open access of well-curated project data and information. We employ F.A.I.R. Principles that compri
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!